Misinformation warnings: Twitter’s soft moderation effects on COVID-19 vaccine belief echoes F Sharevski, R Alsaadi, P Jachim, E Pieroni Computers & security 114, 102577, 2022 | 67 | 2022 |
Mitigating active shooter impact; Analysis for policy options based on agent/computer based modeling C Anklam, A Kirby, F Sharevski, JE Dietz | 47 | 2014 |
(Mis) perceptions and engagement on Twitter: COVID-19 vaccine rumors on efficacy and mass immunization effort F Sharevski, A Huff, P Jachim, E Pieroni International Journal of Information Management Data Insights 2 (1), 100059, 2022 | 35 | 2022 |
Trollhunter [evader]: Automated detection [evasion] of twitter trolls during the covid-19 pandemic P Jachim, F Sharevski, P Treebridge Proceedings of the New Security Paradigms Workshop 2020, 59-75, 2020 | 34 | 2020 |
Novel approach for cybersecurity workforce development: A course in secure design F Sharevski, A Trowbridge, J Westbrook 2018 IEEE integrated STEM education conference (ISEC), 175-180, 2018 | 31 | 2018 |
To tweet or not to tweet: Covertly manipulating a Twitter debate on vaccines using malware-induced misperceptions F Sharevski, P Jachim, K Florek Proceedings of the 15th international conference on availability …, 2020 | 29 | 2020 |
Misinformation warning labels: Twitter's soft moderation effects on COVID-19 vaccine belief echoes F Sharevski, R Alsaadi, P Jachim, E Pieroni arXiv preprint arXiv:2104.00779, 2021 | 28 | 2021 |
Phishing with malicious QR codes F Sharevski, A Devine, E Pieroni, P Jachim Proceedings of the 2022 European Symposium on Usable Security, 160-171, 2022 | 25 | 2022 |
TrollHunter2020: Real-time detection of trolling narratives on Twitter during the 2020 US elections P Jachim, F Sharevski, E Pieroni Proceedings of the 2021 ACM workshop on security and privacy analytics, 55-65, 2021 | 25 | 2021 |
User-targeted denial-of-service attacks in LTE mobile networks R Ghannam, F Sharevski, A Chung 2018 14th International conference on wireless and mobile computing …, 2018 | 23 | 2018 |
Meet Malexa, Alexa’s malicious twin: Malware-induced misperception through intelligent voice assistants F Sharevski, P Jachim, P Treebridge, A Li, A Babin, C Adadevoh International Journal of Human-Computer Studies 149, 102604, 2021 | 21 | 2021 |
Rules of professional responsibility in digital forensics: A comparative analysis F Sharevski Journal of Digital Forensics, Security and Law 10 (2), 3, 2015 | 20 | 2015 |
Meaningful context, a red flag, or both? preferences for enhanced misinformation warnings among us twitter users F Sharevski, A Devine, P Jachim, E Pieroni Proceedings of the 2022 European Symposium on Usable Security, 189-201, 2022 | 19 | 2022 |
Towards 5G cellular network forensics F Sharevski EURASIP Journal of Information Security 2918 (8), 1-8, 2018 | 17 | 2018 |
Parlermonium: A data-driven ux design evaluation of the parler platform E Pieroni, P Jachim, N Jachim, F Sharevski arXiv preprint arXiv:2106.00163, 2021 | 16 | 2021 |
Digital forensic investigation in cloud computing environment: impact on privacy F Sharevski 2013 8th International Workshop on Systematic Approaches to Digital …, 2013 | 15 | 2013 |
Abortion misinformation on tiktok: Rampant content, lax moderation, and vivid user experiences F Sharevski, JV Loop, P Jachim, A Devine, E Pieroni arXiv preprint arXiv:2301.05128, 2023 | 14 | 2023 |
Voxpop: An experimental social media platform for calibrated (mis) information discourse F Sharevski, P Jachim, E Pieroni, N Jachim Proceedings of the 2021 New Security Paradigms Workshop, 88-107, 2021 | 14 | 2021 |
Experiential user-centered security in a classroom: Secure design for iot F Sharevski, P Treebridge, J Westbrook IEEE Communications Magazine 57 (11), 48-53, 2019 | 14 | 2019 |
The CATS hackathon: Creating and refining test items for cybersecurity concept inventories AT Sherman, L Oliva, E Golaszewski, D Phatak, T Scheponik, GL Herman, ... IEEE Security & Privacy 17 (6), 77-83, 2019 | 13 | 2019 |